Risk Assessment Section
- Conduct an inventory of devices within the chosen organization's network using appropriate tools.
- Provide a summary of the number of desktops, laptops, network printers, and servers.
o Identify key assets.
o Assets also include records and sensitive information that requires special protection.
- Prioritize each asset or group of assets, and assign a value to each.
- Create a subsection that will identify and describe the risks within the environment.
o Do not forget natural disasters.
o Include the likelihood that the risk could occur.
o Provide a list of the tools and methodology that you used to conduct the risk assessment.